Abstract

Physical layer security (PLS) has been proposed to afford an extra layer of security on top of the conventional cryptographic techniques. Unlike the conventional complexity-based cryptographic techniques at the upper layers, physical layer security exploits the characteristics of wireless channels, e.g., fading, noise, interference, etc., to enhance wireless security. It is proved that secure transmission can benefit from fading channels. Accordingly, numerous researchers have explored what fading can offer for physical layer security, especially the investigation of physical layer security over wiretap fading channels. Therefore, this paper aims at reviewing the existing and ongoing research works on this topic. More specifically, we present a classification of research works in terms of the four categories of fading models: (i) small-scale, (ii) large-scale, (iii) composite, and (iv) cascaded. To elaborate these fading models with a generic and flexible tool, three promising candidates, including the mixture gamma (MG), mixture of Gaussian (MoG), and Fox’s H-function distributions, are comprehensively examined and compared. Their advantages and limitations are further demonstrated via security performance metrics, which are designed as vivid indicators to measure how perfect secrecy is ensured. Two clusters of secrecy metrics, namely (i) secrecy outage probability (SOP), and the lower bound of SOP; and (ii) the probability of nonzero secrecy capacity (PNZ), the intercept probability, average secrecy capacity (ASC), and ergodic secrecy capacity, are displayed and, respectively, deployed in passive and active eavesdropping scenarios. Apart from those, revisiting the secrecy enhancement techniques based on Wyner’s wiretap model, the on-off transmission scheme, jamming approach, antenna selection, and security region are discussed.

Highlights

  • As stated in the latest released statistics by the International Telecommunications Union (ITU) in 2020 [1], COVID-19, to some extent, acts as an accelerator that pushes consumers and businesses to largely adopt digital services and technologies, which in return quickens the digital transformation for societies, business, and governments

  • In [109], the effects of outdated Channel state information (CSI) on security performance were investigated over multiple-input single-output (MISO) systems when the transmit antenna selection (TAS) scheme is applied at a legitimate source (Alice)

  • 6 Concluding remarks In this paper, we have comprehensively reviewed the development of Physical layer security (PLS) over various wiretap fading channels

Read more

Summary

Introduction

As stated in the latest released statistics by the International Telecommunications Union (ITU) in 2020 [1], COVID-19, to some extent, acts as an accelerator that pushes consumers and businesses to largely adopt digital services and technologies, which in return quickens the digital transformation for societies, business, and governments. The SOP is correspondingly adopted as the key secrecy metric to evaluate how perfect secrecy is compromised Inspired by these fundamental research works, numerous research works focus on analyzing the security performance metrics over a diverse body of fading wiretap channels for the sake of better understanding the impacts of fading characteristic on secure communications, to list some, Rayleigh [9], Nakagami-m, Weibull [32], Rician (Nakagami-q) [33, 34], Hoyt (Nakagami-n) [35, 36], Lognormal [37], α − μ (equivalently generalized Gamma or Stacy) [38–42], κ − μ [43–46], η − μ [47], generalized-K ( KG ) [48–51], extend generalized-K (EGK) [52], Fisher-Snedecor F [53, 54], Gamma-Gamma [55], shadowed κ − μ [56], double shadowed Rician [57], Fox’s H-function [52], cascaded Rayleigh/Nakagami-m/α − μ [58–60], cascaded κ − μ [61], α − κ − μ/α − η − μ [62], Beaulieu-Xie [63], α − κ − η − μ [64, 65], two-wave with diffuse power (TWDP) [31], N-wave with diffuse power (NWDP) [66], κ − μ/Gamma [67], Fluctuating Beckmann [68], correlated Rayleigh [69], correlated composite Nakagami-m/Gamma [70], correlated α − μ [71], correlated shadowed κ − μ [72], mixed η − μ and Málaga [73], Málaga [74–78], fluctuating two-ray (FTR) channels [79, 80].

Intercept probability
Average secrecy capacity
Security performance bounds
The lower bound of SOP
Ergodic secrecy capacity
Large‐scale fading channels
Composite fading channels
Cascaded fading channels
Generic secrecy analysis tools
Mixture Gamma (MG) distribution
Mixture of Gaussian (MoG) distribution
Fox’s H‐function distribution
Outdated and imperfect and correlated CSI
Limitations
On‐off transmission scheme Consider the imperfect channel estimation, He and
Jamming approach
Antenna selection technique
Protected zones
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call